The number of mobile devices, such as smartphones and smartwatches, is relentlessly increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …
Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and …
Recent natural language processing (NLP) techniques have accomplished high performance on benchmark data sets, primarily due to the significant improvement in the …
FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to communicate real-time data It is crucial to constantly ensure that the user is not …
Current security mechanisms in mobile devices such as PINs, passwords, patterned passwords, and biometrics are one-time entry-point authentication and vulnerable to attacks …
Authenticating a user in the right way is essential to IT systems, where the risks are becoming more and more complex. Especially in the mobile world, banking applications are …
Y Li, P Tao, S Deng, G Zhou - ACM Transactions on Sensor Networks …, 2021 - dl.acm.org
Smartphones have become crucial and important in our daily life, but the security and privacy issues have been major concerns of smartphone users. In this article, we present …
Abstract The Internet of Things (IoT) has introduced a new dimension to the Internet in the last decade; nonetheless, security, particularly attacks on authentication, continue to be a …
L Hernández-Álvarez, JM de Fuentes… - Sensors, 2020 - mdpi.com
Ensuring the confidentiality of private data stored in our technological devices is a fundamental aspect for protecting our personal and professional information. Authentication …